Increase in SSH attacks as of announcement of rtld bug

看板FB_security作者時間16年前 (2009/12/02 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/16 (看更多)
Everyone: I don't know if it's a coincidence, but I doubt it is: Since the announcement of the rtld bug, we've seen a precipitous increase in the number of SSH password guessing attacks on our systems. Apparently, the folks who are mounting the attacks (usually via botnets) have realized that if they get into user shell account on an unpatched system, they have effectively broken root. It would be wise for all FreeBSD system administrators to set AllowUsers as restrictively as possible in sshd_config, and also (because the attacks can take a great toll on servers in terms of CPU and other resources) consider other changes to "armor" their systems against SSH attacks. It may be time, in fact, to consider implementing single packet authentication as the default in SSH servers and as a built-in feature in SSH clients. (Does anyone know of a good SSH client that integrates a single packet authentication system -- e.g. fwknop? I'm already seeking sources and a toolchain so that I can try my hand at doing this for TeraTerm.) --Brett Glass _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1B5LdcBi (FB_security)
討論串 (同標題文章)
完整討論串 (本文為第 1 之 16 篇):
文章代碼(AID): #1B5LdcBi (FB_security)